input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2019-0803
CVE-2019-0803 in Windows. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-6964
CVE-2020-6964 in GE CARESCAPE Systems. Has primary impact with T1190 : Exploit Public-Facing Application. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2020-11651
CVE-2020-11651 in SaltStack Salt before 2019.2.4 and 3000 before 3000.2.. Is related with T1528 : Steal Application Access Token. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2019-1215
CVE-2019-1215, State: PUBLISHED, Published: 2019-09-11T21:24:58, Updated: 2024-08-04T18:13:29.707Z, Description: An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, C...
Techniques related with vulnerability CVE-2016-6366
CVE-2016-6366 in Cisco Adaptive Security Appliance. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-3387
CVE-2020-3387 in Cisco SD-WAN vManage. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2019-11932
CVE-2019-11932, State: PUBLISHED, Published: 2019-10-03T21:13:47, Updated: 2024-08-04T23:10:29.690Z, Description: A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android...
Techniques related with vulnerability CVE-2020-5279
CVE-2020-5279 in PrestaShop. Has primary impact with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-8111
CVE-2018-8111, State: PUBLISHED, Published: 2018-06-14T12:00:00, Updated: 2024-08-05T06:46:13.454Z, Description: A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is uniqu...
Describe the vulnerability CVE-2019-5910
CVE-2019-5910, State: PUBLISHED, Published: 2019-02-13T18:00:00, Updated: 2024-08-04T20:09:23.783Z, Description: Directory traversal vulnerability in HOUSE GATE App for iOS 1.7.8 and earlier allows remote attackers to read arbitrary files via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit inf...
Describe the vulnerability CVE-2011-1331
CVE-2011-1331, State: PUBLISHED, Published: 2011-07-18T22:00:00, Updated: 2024-08-06T22:21:34.200Z, Description: JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or ...
Describe MITRE technique T0873
MITRE T0873 : Project File Infection from ics Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using bui...
Techniques related with vulnerability CVE-2020-5386
CVE-2020-5386 in Elastic Cloud Storage. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2020-15199
CVE-2020-15199 in tensorflow. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-3568
CVE-2019-3568 in WhatsApp for Android. Is related with T1477 : Exploit via Radio Interfaces.
Techniques related with vulnerability CVE-2020-15094
CVE-2020-15094 in symfony. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1040 : Network Sniffing.
Techniques related with vulnerability CVE-2018-0622
CVE-2018-0622 in DHC Online Shop App for Android. Is related with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2019-13555
CVE-2019-13555, State: PUBLISHED, Published: 2019-11-13T22:27:22, Updated: 2024-08-04T23:57:39.411Z, Description: In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial numbe...
Describe the vulnerability CVE-2014-6287
CVE-2014-6287, State: PUBLISHED, Published: 2014-10-07T10:00:00, Updated: 2024-08-06T12:10:13.249Z, Description: The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search act...
Describe the vulnerability CVE-2020-11054
CVE-2020-11054, State: PUBLISHED, Published: 2020-05-07T20:35:29, Updated: 2024-08-04T11:21:14.636Z, Description: In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.sta...
Describe the vulnerability CVE-2014-7187
CVE-2014-7187, State: PUBLISHED, Published: 2014-09-28T19:00:00, Updated: 2024-08-06T12:40:19.211Z, Description: Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possi...
Describe MITRE technique T1518
MITRE T1518 : Software Discovery from enterprise Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from [Software Discovery](T1518) during automated discovery to shape follow-on behaviors, including wh...
Techniques related with vulnerability CVE-2018-19010
CVE-2018-19010 in Delta Monitor. Has primary impact with T1499 : Endpoint Denial of Service . Has an exploitation technique T1190 : Exploit Public-Facing Application .
Describe MITRE technique T1539
MITRE T1539 : Steal Web Session Cookie from enterprise An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication...
Describe the vulnerability CVE-2014-1815
CVE-2014-1815, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.381Z, Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as exploited in the wild in May 2014, aka "...
Describe MITRE technique T0804
MITRE T0804 : Block Reporting Message from ics Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting m...
Describe MITRE technique T1550.002
MITRE T1550.002 : Pass the Hash from enterprise Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method b...
Techniques related with vulnerability CVE-2019-1611
CVE-2019-1611 in Firepower 4100 Series Next-Generation Firewalls. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2017-2404
CVE-2017-2404 in iOS before 10.3. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-9019
CVE-2019-9019, State: PUBLISHED, Published: 2019-02-22T20:00:00Z, Updated: 2024-09-16T17:23:54.401Z, Description: The British Airways Entertainment System, as installed on Boeing 777-36N(ER) and possibly other aircraft, does not prevent the USB charging/data-transfer feature from interacting with USB keyboard and mouse...
Describe the vulnerability CVE-2014-6277
CVE-2014-6277, State: PUBLISHED, Published: 2014-09-27T22:00:00, Updated: 2024-08-06T12:10:13.286Z, Description: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (unin...
Describe the vulnerability CVE-2016-4656
CVE-2016-4656, State: PUBLISHED, Published: 2016-08-25T21:00:00, Updated: 2024-08-06T00:39:25.780Z, Description: The kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app., No CVSS metrics available, Exploit...
Describe the vulnerability CVE-2019-3735
CVE-2019-3735, State: PUBLISHED, Published: 2019-06-20T21:43:26.331005Z, Updated: 2024-09-17T00:12:00.256Z, Description: Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management V...
Techniques related with vulnerability CVE-2017-8543
CVE-2017-8543 in Microsoft Windows. Is related with T1210 : Exploitation of Remote Services.
Describe MITRE technique T1518.001
MITRE T1518.001 : Security Software Discovery from enterprise Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as cloud monitoring agents and anti-virus. Adversaries may use ...
Techniques related with vulnerability CVE-2020-6993
CVE-2020-6993 in Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2018-20753
CVE-2018-20753 in Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5. Is related with T1212 : Exploitation for Credential Access.
Describe the vulnerability CVE-2015-7931
CVE-2015-7931, State: PUBLISHED, Published: 2015-12-24T01:00:00, Updated: 2024-08-06T08:06:31.287Z, Description: The Java client in Adcon Telemetry A840 Telemetry Gateway Base Station does not authenticate the station device, which allows man-in-the-middle attackers to spoof devices and obtain sensitive information by ...
Techniques related with vulnerability CVE-2015-0072
CVE-2015-0072 in Internet Explorer 9 through 11. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-0636
CVE-2020-0636, State: PUBLISHED, Published: 2020-01-14T23:11:34, Updated: 2024-08-04T06:11:04.575Z, Description: An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'., No CVSS metrics availabl...
Techniques related with vulnerability CVE-2018-8852
CVE-2018-8852 in e-Alert Unit (non-medical device). Has primary impact with T1563 : Remote Service Session Hijacking.
Describe the vulnerability CVE-2018-14809
CVE-2018-14809, State: PUBLISHED, Published: 2018-09-26T20:00:00Z, Updated: 2024-09-16T22:03:37.405Z, Description: Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information availab...
Techniques related with vulnerability CVE-2018-14819
CVE-2018-14819 in V-Server. Has primary impact with T1574 : Hijack Execution Flow.
Techniques related with vulnerability CVE-2020-3237
CVE-2020-3237 in Cisco IOx. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2017-11882
CVE-2017-11882, State: PUBLISHED, Published: 2017-11-15T03:00:00Z, Updated: 2024-09-16T17:03:49.911Z, Description: Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the cur...
Describe the vulnerability CVE-2015-2502
CVE-2015-2502, State: PUBLISHED, Published: 2015-08-19T10:00:00, Updated: 2024-08-06T05:17:27.264Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as e...
Techniques related with vulnerability CVE-2016-6415
CVE-2016-6415 in Cisco IOS, IOS XE, IOS XR and PIX. Is related with T1212 : Exploitation for Credential Access.
Describe MITRE technique T0836
MITRE T0836 : Modify Parameter from ics Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may speci...
Describe the vulnerability CVE-2020-5362
CVE-2020-5362, State: PUBLISHED, Published: 2020-06-10T20:40:12.957208Z, Updated: 2024-09-17T02:41:23.331Z, Description: Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS adm...
Describe the vulnerability CVE-2020-14508
CVE-2020-14508, State: PUBLISHED, Published: 2020-08-25T13:15:19.248229Z, Updated: 2024-09-16T16:33:48.741Z, Description: GateManager versions prior to 9.2c, The affected product is vulnerable to an off-by-one error, which may allow an attacker to remotely execute arbitrary code or cause a denial-of-service condition.,...
Describe the vulnerability CVE-2020-3397
CVE-2020-3397, State: PUBLISHED, Published: 2020-08-27T15:40:34.148007Z, Updated: 2024-11-13T18:09:56.819Z, Description: A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to unexpec...
Describe MITRE technique T1499.003
MITRE T1499.003 : Application Exhaustion Flood from enterprise Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to thos...
Techniques related with vulnerability CVE-2017-11882
CVE-2017-11882 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2017-16651
CVE-2017-16651 in Roundcube Webmail. Is related with T1005 : Data from Local System. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-15956
CVE-2019-15956 in Cisco Web Security Appliance (WSA). Has primary impact with T1499 : Endpoint Denial of Service. Has primary impact with T1098 : Account Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2018-9206
CVE-2018-9206 in Blueimp jQuery-File-Upload. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-15782
CVE-2018-15782, State: PUBLISHED, Published: 2019-01-16T20:00:00Z, Updated: 2024-09-17T03:38:58.943Z, Description: The Quick Setup component of RSA Authentication Manager versions prior to 8.4 is vulnerable to a relative path traversal vulnerability. A local attacker could potentially provide an administrator with a cr...
Describe the vulnerability CVE-2009-1136
CVE-2009-1136, State: PUBLISHED, Published: 2009-07-15T15:00:00, Updated: 2024-08-07T05:04:47.977Z, Description: The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office...
Techniques related with vulnerability CVE-2018-11084
CVE-2018-11084 in Garden-runC. Has primary impact with T1496 : Resource Hijacking.
Describe the vulnerability CVE-2018-11776
CVE-2018-11776, State: PUBLISHED, Published: 2018-08-22T13:00:00Z, Updated: 2024-09-16T19:36:52.447Z, Description: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: result...
Describe the vulnerability CVE-2018-18987
CVE-2018-18987, State: PUBLISHED, Published: 2018-11-30T18:00:00, Updated: 2024-08-05T11:23:08.984Z, Description: VT-Designer Version 2.1.7.31 is vulnerable by the program populating objects with user supplied input via a file without first checking for validity, allowing attacker supplied input to be written to known ...
Describe the vulnerability CVE-2016-7189
CVE-2016-7189, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-06T01:50:47.627Z, Description: The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote Code Execution Vulnerability.", No CVSS metrics available...
Describe the vulnerability CVE-2019-6563
CVE-2019-6563, State: PUBLISHED, Published: 2019-03-05T21:00:00Z, Updated: 2024-09-16T18:44:20.929Z, Description: Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device., No CVSS metric...
Describe the vulnerability CVE-2020-11030
CVE-2020-11030, State: PUBLISHED, Published: 2020-04-30T22:15:14, Updated: 2024-08-04T11:21:14.171Z, Description: In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the abilit...
Describe the vulnerability CVE-2017-0199
CVE-2017-0199, State: PUBLISHED, Published: 2017-04-12T14:00:00, Updated: 2024-08-05T12:55:19.131Z, Description: Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers...
Describe the vulnerability CVE-2020-12024
CVE-2020-12024, State: PUBLISHED, Published: 2020-06-29T13:51:31, Updated: 2024-08-04T11:48:58.000Z, Description: Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Suc...
Techniques related with vulnerability CVE-2015-7756
CVE-2015-7756 in Juniper ScreenOS 6. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-16784
CVE-2019-16784 in PyInstaller. Has primary impact with T1190 : Exploit Public-Facing Application. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059.006 : Python.
Describe the vulnerability CVE-2018-2894
CVE-2018-2894, State: PUBLISHED, Published: 2018-07-18T13:00:00, Updated: 2024-10-02T20:21:29.376Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploita...
Describe MITRE technique T1068
MITRE T1068 : Exploitation for Privilege Escalation from enterprise Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system softwar...
Describe the vulnerability CVE-2016-9079
CVE-2016-9079, State: PUBLISHED, Published: 2018-06-11T21:00:00, Updated: 2024-08-06T02:42:10.169Z, Description: A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerabil...
Techniques related with vulnerability CVE-2019-13538
CVE-2019-13538 in 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0. Is related with T1059.007 : JavaScript. Is related with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2014-3413
CVE-2014-3413 in MySQL server in Juniper Networks Junos Space before 13.3R1.8. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Describe MITRE technique T1566.002
MITRE T1566.002 : Spearphishing Link from enterprise Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to ...
Techniques related with vulnerability CVE-2018-11776
CVE-2018-11776 in Apache Struts. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2019-15243
CVE-2019-15243, State: PUBLISHED, Published: 2019-10-16T18:36:32.324245Z, Updated: 2024-11-20T17:06:27.049Z, Description: Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabiliti...
Describe MITRE technique T1574.002
MITRE T1574.002 : DLL Side-Loading from enterprise Adversaries may execute their own malicious payloads by side-loading DLLs. Similar to [DLL Search Order Hijacking](T1574.001), side-loading involves hijacking which DLL a program loads. But rather than just planting the DLL within the search order of a program then wai...
Techniques related with vulnerability CVE-2012-6498
CVE-2012-6498 in Atomymaxsite 2.5 and earlier. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. Is related with T1505.003 : Web Shell.
Techniques related with vulnerability CVE-2010-3081
CVE-2010-3081 in Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2020-11901
CVE-2020-11901 in Treck TCP/IP stack before 6.0.1.66. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1059.007 : JavaScript.
Describe the vulnerability CVE-2018-8440
CVE-2018-8440, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:36.460Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, ...
Describe the vulnerability CVE-2018-15801
CVE-2018-15801, State: PUBLISHED, Published: 2018-12-19T22:00:00Z, Updated: 2024-09-16T18:43:45.437Z, Description: Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious ...
Describe the vulnerability CVE-2020-11738
CVE-2020-11738, State: PUBLISHED, Published: 2020-04-13T21:20:00, Updated: 2024-08-04T11:41:59.578Z, Description: The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init., CVSS v3....
Describe the vulnerability CVE-2020-5271
CVE-2020-5271, State: PUBLISHED, Published: 2020-04-20T16:50:39, Updated: 2024-08-04T08:22:09.101Z, Description: In PrestaShop between versions 1.6.0.0 and 1.7.6.5, there is a reflected XSS with `date_from` and `date_to` parameters in the dashboard page This problem is fixed in 1.7.6.5, CVSS v3.1 - Attack Complexity: L...
Describe the vulnerability CVE-2012-1854
CVE-2012-1854, State: PUBLISHED, Published: 2012-07-10T21:00:00, Updated: 2024-08-06T19:08:38.695Z, Description: Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for App...
Techniques related with vulnerability CVE-2017-0262
CVE-2017-0262 in Microsoft Office. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15182
CVE-2020-15182, State: PUBLISHED, Published: 2020-09-17T19:20:15, Updated: 2024-08-04T13:08:22.487Z, Description: The SOY Inquiry component of SOY CMS is affected by Cross-site Request Forgery (CSRF) and Remote Code Execution (RCE). The vulnerability affects versions 2.0.0.3 and earlier of SOY Inquiry. This allows remo...
Describe the vulnerability CVE-2020-14510
CVE-2020-14510, State: PUBLISHED, Published: 2020-08-25T13:19:33.362484Z, Updated: 2024-09-16T19:25:36.335Z, Description: GateManager versions prior to 9.2c, The affected product contains a hard-coded credential for telnet, allowing an unprivileged attacker to execute commands as root., CVSS v3.1 - Attack Complexity: L...
Techniques related with vulnerability CVE-2019-2729
CVE-2019-2729 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2018-11087
CVE-2018-11087 in Spring AMQP. Has primary impact with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2019-3396
CVE-2019-3396, State: PUBLISHED, Published: 2019-03-25T18:37:06.256667Z, Updated: 2024-09-16T23:30:57.985Z, Description: The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 bef...
Techniques related with vulnerability CVE-2019-1941
CVE-2019-1941 in Cisco Identity Services Engine Software. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2016-6909
CVE-2016-6909 in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1204
MITRE T1204 : User Execution from enterprise An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as f...
Describe the vulnerability CVE-2020-10817
CVE-2020-10817, State: PUBLISHED, Published: 2020-03-27T18:19:48, Updated: 2024-08-04T11:14:15.566Z, Description: The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued., No CVSS metrics available, Exp...
Describe the vulnerability CVE-2013-1289
CVE-2013-1289, State: PUBLISHED, Published: 2013-04-09T22:00:00, Updated: 2024-08-06T14:57:04.654Z, Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitr...
Describe the vulnerability CVE-2019-0903
CVE-2019-0903, State: PUBLISHED, Published: 2019-05-16T18:17:02, Updated: 2024-08-04T17:58:59.624Z, Description: A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'., No CVSS metrics availa...
Techniques related with vulnerability CVE-2019-9019
CVE-2019-9019 in British Airways Entertainment System. Is related with T1200 : Hardware Additions. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2012-0874
CVE-2012-0874, State: PUBLISHED, Published: 2013-02-05T23:11:00, Updated: 2024-08-06T18:38:14.958Z, Description: The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Plat...
Techniques related with vulnerability CVE-2019-13510
CVE-2019-13510 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation.